Analysis
-
max time kernel
43s -
max time network
114s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
18-05-2021 10:02
Static task
static1
Behavioral task
behavioral1
Sample
49025966d2dd612fc1e423b01620debfd4c97701aefe2.exe
Resource
win7v20210410
General
-
Target
49025966d2dd612fc1e423b01620debfd4c97701aefe2.exe
-
Size
1.0MB
-
MD5
d6109df4ffa4303e3c30ba997735b689
-
SHA1
65ac8413b14d7ccb6c848e849caa0de7900116ee
-
SHA256
49025966d2dd612fc1e423b01620debfd4c97701aefe26a836cea9e2f2d6ab47
-
SHA512
5e735b12e77ab991c9d54b701645268579f154573aa8a04d8bf2cdb5ed59d3a8ede9f5e55cbce848cd5323fa1e6b3950d12ec5bb7a0bebb403d3711979e1cc8b
Malware Config
Extracted
redline
1111
65.21.144.202:62942
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
resource yara_rule behavioral2/memory/3980-128-0x0000000000590000-0x00000000005AC000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
pid Process 3948 Immobilita.exe.com 3736 Immobilita.exe.com 3980 RegAsm.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3736 set thread context of 3980 3736 Immobilita.exe.com 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 212 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3980 RegAsm.exe 3980 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3980 RegAsm.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3724 wrote to memory of 2440 3724 49025966d2dd612fc1e423b01620debfd4c97701aefe2.exe 75 PID 3724 wrote to memory of 2440 3724 49025966d2dd612fc1e423b01620debfd4c97701aefe2.exe 75 PID 3724 wrote to memory of 2440 3724 49025966d2dd612fc1e423b01620debfd4c97701aefe2.exe 75 PID 2440 wrote to memory of 2712 2440 cmd.exe 77 PID 2440 wrote to memory of 2712 2440 cmd.exe 77 PID 2440 wrote to memory of 2712 2440 cmd.exe 77 PID 2712 wrote to memory of 4032 2712 cmd.exe 79 PID 2712 wrote to memory of 4032 2712 cmd.exe 79 PID 2712 wrote to memory of 4032 2712 cmd.exe 79 PID 2712 wrote to memory of 3948 2712 cmd.exe 80 PID 2712 wrote to memory of 3948 2712 cmd.exe 80 PID 2712 wrote to memory of 3948 2712 cmd.exe 80 PID 2712 wrote to memory of 212 2712 cmd.exe 81 PID 2712 wrote to memory of 212 2712 cmd.exe 81 PID 2712 wrote to memory of 212 2712 cmd.exe 81 PID 3948 wrote to memory of 3736 3948 Immobilita.exe.com 82 PID 3948 wrote to memory of 3736 3948 Immobilita.exe.com 82 PID 3948 wrote to memory of 3736 3948 Immobilita.exe.com 82 PID 3736 wrote to memory of 3980 3736 Immobilita.exe.com 86 PID 3736 wrote to memory of 3980 3736 Immobilita.exe.com 86 PID 3736 wrote to memory of 3980 3736 Immobilita.exe.com 86 PID 3736 wrote to memory of 3980 3736 Immobilita.exe.com 86 PID 3736 wrote to memory of 3980 3736 Immobilita.exe.com 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\49025966d2dd612fc1e423b01620debfd4c97701aefe2.exe"C:\Users\Admin\AppData\Local\Temp\49025966d2dd612fc1e423b01620debfd4c97701aefe2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Windows\system32\cmd < Convertira.xls2⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd3⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^UNkJJcORLwTPMDHRmEAwfHRFAGvpIPVddQfdtvAkCrkhWSsYbERcArMjWGpeZEpVyDnVgdMrrgnjcDIHfb$" Dio.xls4⤵PID:4032
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Immobilita.exe.comImmobilita.exe.com b4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Immobilita.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Immobilita.exe.com b5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3980
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 304⤵
- Runs ping.exe
PID:212
-
-
-